summaryrefslogtreecommitdiff
path: root/network/psad/slack-desc
diff options
context:
space:
mode:
authordavjohn <david.cla2@gmail.com>2017-03-02 22:58:28 +0700
committerWilly Sudiarto Raharjo <willysr@slackbuilds.org>2017-03-02 22:58:28 +0700
commitd9935e73b64a352af06be60cfadfa85c5f8c8e09 (patch)
tree7a9fb7b489dba75c0827ea6be41a11cff326176c /network/psad/slack-desc
parentb536f66ef48f7b24a28af98bb95f703c50f47396 (diff)
downloadslackbuilds-d9935e73b64a352af06be60cfadfa85c5f8c8e09.tar.gz
network/psad: Updated for version 2.4.4.
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'network/psad/slack-desc')
-rw-r--r--network/psad/slack-desc7
1 files changed, 3 insertions, 4 deletions
diff --git a/network/psad/slack-desc b/network/psad/slack-desc
index 9624bb23c7..007143d490 100644
--- a/network/psad/slack-desc
+++ b/network/psad/slack-desc
@@ -10,10 +10,9 @@ psad: psad (Intrusion Detection and Log Analysis with iptables)
psad:
psad: psad is a collection of three lightweight system daemons (two main
psad: daemons and one helper daemon) that run on Linux machines and analyze
-psad: iptables log messages to detect port scans and other suspicious
-psad: traffic.
-psad: A typical deployment is to run psad on the iptables firewall where
-psad: it has the fastest access to log data.
+psad: iptables log messages to detect port scans and other suspicious.
+psad: traffic. A typical deployment is to run psad on the iptables firewall
+psad: where it has the fastest access to log data.
psad:
psad: Homepage: http://www.cipherdyne.org/psad/
psad: